-
1
Integrasi Audit dan Teknik Clustering untuk Segmentasi dan Kategorisasi Aktivitas Log
Published 2024-02-01Subjects: Get full text
Article -
2
Analisis Burnout Programmer Terhadap Penerapan Secure Coding
Published 2024-08-01Subjects: Get full text
Article -
3
Implementation of Generative Language Models (GLM) in Cyber Exercise Secure Coding using Prompt Engineering
Published 2025-04-01Subjects: Get full text
Article -
4
Cybersecurity Risks in EV Mobile Applications: A Comparative Assessment of OEM and Third-Party Solutions
Published 2025-06-01Subjects: Get full text
Article -
5
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: “…attribute-based encryption;traitor tracing;dual system encryption;adaptive security;collusion secure code…”
Get full text
Article -
6
Secure command transmission techniques for industrial remote control
Published 2025-05-01Subjects: Get full text
Article -
7
Adaptively secure attribute-based encryption for traitor tracing
Published 2016-01-01Subjects: Get full text
Article